CrowdStrike

CrowdStrike

IT Asset Management (Falcon Discover)

CrowdStrike's Falcon Discover is a module that visualizes IT assets within an organization based on terminal logs collected by Falcon Insight (EDR).

It is possible to visualize the shadow areas in the customer environment from the perspective of "application", "managed / unmanaged terminal", "HW", and "account".

Focus on IT hygiene

Focus on IT hygiene

Recently, there have been many cases in which attacks using vulnerabilities* are carried out, including malicious attacks such as unauthorized access and ransomware.
*Refers to an information security flaw that occurs due to a program malfunction or design error in a computer's OS or software.

The concept of IT hygiene (also known as cyber hygiene, security hygiene, and IT hygiene management) is attracting attention as a countermeasure against these threats.

IT hygiene is a concept that aims to keep endpoints up-to-date and appropriate, maintain the health of the system, and protect it from internal and external threats.

Focus on IT hygiene
Focus on IT hygiene

Having visibility across your environment is the first step towards IT hygiene. With Falcon Discover, you can address potential blind spots within your organization.

Value provided by CrowdStrike Falcon Discover

(1) Visualization of applications used

Visualize applications installed on devices with sensors from multiple perspectives, such as versions, devices with sensors installed, and devices without sensors

(1) Visualization of applications used

Extract the list of terminals using the application and the list of terminals not using the application

You can check each version and visualize whether it is being operated properly and on which terminal it is being used.

(1) Visualization of applications used

(2) Visualization of managed/unmanaged terminals

Visualize terminals with/without sensors and NW devices

(2) Visualization of managed/unmanaged terminals

Based on the ARP information of the terminal where the sensor is installed, the equipment where the sensor is not installed is visualized, and based on the vendor information, the equipment where the sensor can be installed (Unmanaged Corporate Assets) and the network equipment where the sensor cannot be installed (Unmanaged Corporate Assets) Visualize Unsupported Assets

(2) Visualization of managed/unmanaged terminals

Value provided by CrowdStrike Falcon Discover

Visualization of terminal HW

Visualize HW information, resources, and device encryption status of terminals where sensors are installed

Visualization of terminal HW
Visualization of terminal HW

Value provided by CrowdStrike Falcon Discover

④ Visualization of user accounts

Visualize HW information, resources, and device encryption status of terminals where sensors are installed

④ Visualization of user accounts

Check the type of account logged in (Local or Domain) and whether you have administrator privileges.

④ Visualization of user accounts

Visualize failed logon events and discover suspicious behavior

④ Visualization of user accounts

Inquiry/Document request

In charge of Macnica CrowdStrike Co., Ltd.

Mon-Fri 8:45-17:30